{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T18:45:30Z","timestamp":1775069130323,"version":"3.50.1"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1109\/drcn.2015.7149025","type":"proceedings-article","created":{"date-parts":[[2015,7,17]],"date-time":"2015-07-17T20:09:14Z","timestamp":1437163754000},"page":"267-270","source":"Crossref","is-referenced-by-count":54,"title":["Real-time network anomaly detection system using machine learning"],"prefix":"10.1109","author":[{"given":"Shuai","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Mayanka","family":"Chandrashekar","sequence":"additional","affiliation":[]},{"given":"Yugyung","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Deep","family":"Medhi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"199","article-title":"Minds-minnesota intrusion detection system","author":"ertoz","year":"2004","journal-title":"Next Generation Data Mining"},{"key":"ref11","year":"0","journal-title":"NFSEN"},{"key":"ref12","year":"0","journal-title":"Ntop"},{"key":"ref13","author":"scrutizer","year":"0"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IHMSC.2014.168"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/WiCOM.2012.6478284"},{"key":"ref16","author":"mahout","year":"0"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.17487\/rfc3954","article-title":"Cisco systems netflow services export version 9","author":"claise","year":"2004"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2014.6838304"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ANZIIS.1994.396988"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/762471.762473"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2595641"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2007.374774"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2405153.2405157"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2006.322180"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/505202.505211"},{"key":"ref2","article-title":"Kafka: A distributed messaging system for log processing","author":"kreps","year":"2011","journal-title":"Proc of Workshop on Networking Meets Databases (NetDB)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1327452.1327492"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2005.1495970"}],"event":{"name":"2015 11th International Conference on the Design of Reliable Communication Networks (DRCN)","location":"Kansas City, MO, USA","start":{"date-parts":[[2015,3,24]]},"end":{"date-parts":[[2015,3,27]]}},"container-title":["2015 11th International Conference on the Design of Reliable Communication Networks (DRCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7132053\/7148972\/07149025.pdf?arnumber=7149025","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,28]],"date-time":"2019-08-28T10:45:27Z","timestamp":1566989127000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7149025\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/drcn.2015.7149025","relation":{},"subject":[],"published":{"date-parts":[[2015,3]]}}}